CVE-2021-21605
UNKNOWN
Published 2021-01-13T15:55:29
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2021-21605. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override unrelated `config.xml` files. If the global `config.xml` file is replaced, Jenkins will start up with unsafe legacy defaults after a restart.
Jenkins 2.275, LTS 2.263.2 ensures that agent names are considered valid names for items to prevent this problem.
In case of problems, this change can be reverted by setting the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `jenkins.model.Nodes.enforceNameRestrictions` to `false`.
Affected Packages
Maven
org.jenkins-ci.main:jenkins-core
ECOSYSTEM:
≥0
<2.263.2
Maven
org.jenkins-ci.main:jenkins-core
ECOSYSTEM:
≥2.264
<2.275
CVSS Scoring
CVSS Score
7.5
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
References
Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: December 13, 2022
Published: 2021-01-13T15:55:29
Last Modified: 2024-08-03T18:16:23.505Z
Copied to clipboard!